TY - GEN
T1 - Non-invasive EMI-based fault injection attack against cryptographic modules
AU - Hayashi, Yu Ichi
AU - Homma, Naofumi
AU - Sugawara, Takeshi
AU - Mizuki, Takaaki
AU - Aoki, Takafumi
AU - Sone, Hideaki
PY - 2011
Y1 - 2011
N2 - In this paper, we introduce a new type of intentional electromagnetic interference (IEMI) which causes information leakage in electrical devices without disrupting their operation or damaging their physical structure. Such IEMI could pose a severe threat to a large number of electrical devices with cryptographic modules since it can be used for performing fault injection attacks, which in turn allows for obtaining faulty outputs (i.e., ciphertexts) from cryptographic modules and exploiting them to reveal information about secret keys. Such faulty outputs are usually generated by inducing faults into target modules through modification or invasion of the modules themselves. In contrast, IEMI-based fault injection can be performed on the target modules from a distance by using an off-the-shelf injection probe without leaving any hard evidence of the attack. We demonstrate fault injection attacks based on the above IEMI through experiments using an Advanced Encryption Standard (AES) module implemented on a standard evaluation board (SASEBO). The experimental results indicate that generating effective faults is feasible and, therefore, such IEMI presents a tangible threat to many existing electrical devices and systems that use cryptographic modules for secure communication and transactions.
AB - In this paper, we introduce a new type of intentional electromagnetic interference (IEMI) which causes information leakage in electrical devices without disrupting their operation or damaging their physical structure. Such IEMI could pose a severe threat to a large number of electrical devices with cryptographic modules since it can be used for performing fault injection attacks, which in turn allows for obtaining faulty outputs (i.e., ciphertexts) from cryptographic modules and exploiting them to reveal information about secret keys. Such faulty outputs are usually generated by inducing faults into target modules through modification or invasion of the modules themselves. In contrast, IEMI-based fault injection can be performed on the target modules from a distance by using an off-the-shelf injection probe without leaving any hard evidence of the attack. We demonstrate fault injection attacks based on the above IEMI through experiments using an Advanced Encryption Standard (AES) module implemented on a standard evaluation board (SASEBO). The experimental results indicate that generating effective faults is feasible and, therefore, such IEMI presents a tangible threat to many existing electrical devices and systems that use cryptographic modules for secure communication and transactions.
UR - http://www.scopus.com/inward/record.url?scp=80054758448&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054758448&partnerID=8YFLogxK
U2 - 10.1109/ISEMC.2011.6038411
DO - 10.1109/ISEMC.2011.6038411
M3 - Conference contribution
AN - SCOPUS:80054758448
SN - 9781424447831
T3 - IEEE International Symposium on Electromagnetic Compatibility
SP - 763
EP - 767
BT - EMC 2011 - Proceedings
T2 - 2011 IEEE International Symposium on Electromagnetic Compatibility, EMC 2011
Y2 - 14 August 2011 through 19 August 2011
ER -